Skip to main content

Books in Information systems general

    • Professional Penetration Testing

      • 3rd Edition
      • January 21, 2025
      • Thomas Wilhelm
      • English
      • Paperback
        9 7 8 0 4 4 3 2 6 4 7 8 8
      • eBook
        9 7 8 0 4 4 3 2 6 4 7 9 5
      Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. Chapters cover planning, metrics, and methodologies, the details of running a pen test, including identifying and verifying vulnerabilities, and archiving, reporting and management practices. The material presented will be useful to beginners through advanced practitioners.Here, author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book, the reader can benefit from his years of experience as a professional penetration tester and educator. After reading this book, the reader will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. "...this is a detailed and thorough examination of both the technicalities and the business of pen-testing, and an excellent starting point for anyone getting into the field." –Network Security
    • Computational Frameworks

      • 1st Edition
      • March 28, 2017
      • Mamadou Kaba Traore
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 2 5 6 4
      • eBook
        9 7 8 0 0 8 1 0 2 3 1 6 7
      Computational Frameworks: Systems, Models and Applications provides an overview of advanced perspectives that bridges the gap between frontline research and practical efforts. It is unique in showing the interdisciplinary nature of this area and the way in which it interacts with emerging technologies and techniques. As computational systems are a dominating part of daily lives and a required support for most of the engineering sciences, this book explores their usage (e.g. big data, high performance clusters, databases and information systems, integrated and embedded hardware/software components, smart devices, mobile and pervasive networks, cyber physical systems, etc.).
    • Clinical Informatics Literacy

      • 1st Edition
      • July 28, 2017
      • Dean F. Sittig
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 2 0 6 0
      • eBook
        9 7 8 0 1 2 8 0 3 2 0 7 7
      Clinical Informatics Literacy: 5000 Concepts That Every Informatician Should Know is about all aspects of clinical informatics, a subset of the larger field of biomedical informatics. Clinical Informatics is an applied field that exists at the intersection of the fields of medicine, computer science, information science, anthropology, human factors engineering, cognitive psychology and health services research. As such informaticians are required to have an extremely broad understanding of a considerable swath of the fields at the heart of the health-oriented knowledge economy. The author has collected and explained each one of the relevant concepts during his experience of 27 years working with many of the leaders in the field of clinical informatics at several of the leading academic healthcare institutions around the USA. The author’s experience and his didactic approach make this book an essential source of information for all participants in the clinical informatics field.
    • Security Controls Evaluation, Testing, and Assessment Handbook

      • 1st Edition
      • December 7, 2015
      • Leighton Johnson
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 2 4 2
      • eBook
        9 7 8 0 1 2 8 0 2 5 6 4 2
      Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.
    • Breaking into Information Security

      • 1st Edition
      • December 5, 2015
      • Josh More + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 8 3 9
      • eBook
        9 7 8 0 1 2 8 0 0 9 8 9 5
      Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.
    • Predictive Analytics and Data Mining

      • 1st Edition
      • November 27, 2014
      • Vijay Kotu + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 4 6 0 8
      • eBook
        9 7 8 0 1 2 8 0 1 6 5 0 3
      Put Predictive Analytics into ActionLearn the basics of Predictive Analysis and Data Mining through an easy to understand conceptual framework and immediately practice the concepts learned using the open source RapidMiner tool. Whether you are brand new to Data Mining or working on your tenth project, this book will show you how to analyze data, uncover hidden patterns and relationships to aid important decisions and predictions. Data Mining has become an essential tool for any enterprise that collects, stores and processes data as part of its operations. This book is ideal for business users, data analysts, business analysts, business intelligence and data warehousing professionals and for anyone who wants to learn Data Mining.You’ll be able to:1. Gain the necessary knowledge of different data mining techniques, so that you can select the right technique for a given data problem and create a general purpose analytics process.2. Get up and running fast with more than two dozen commonly used powerful algorithms for predictive analytics using practical use cases.3. Implement a simple step-by-step process for predicting an outcome or discovering hidden relationships from the data using RapidMiner, an open source GUI based data mining tool Predictive analytics and Data Mining techniques covered: Exploratory Data Analysis, Visualization, Decision trees, Rule induction, k-Nearest Neighbors, Naïve Bayesian, Artificial Neural Networks, Support Vector machines, Ensemble models, Bagging, Boosting, Random Forests, Linear regression, Logistic regression, Association analysis using Apriori and FP Growth, K-Means clustering, Density based clustering, Self Organizing Maps, Text Mining, Time series forecasting, Anomaly detection and Feature selection. Implementation files can be downloaded from the book companion site at www.LearnPredictiveA...
    • Information System Development Process

      • 1st Edition
      • Volume 30
      • June 28, 2014
      • N. Prakash + 2 more
      • English
      • Paperback
        9 7 8 0 4 4 4 8 1 5 9 4 1
      • eBook
        9 7 8 1 4 8 3 2 9 8 4 8 1
      This volume aims to pave the way to a greater understanding of the information system development process. Traditionally, information systems have been perceived as a slice of real world history. This has led to a strong emphasis on the development of conceptual models, the requirements specifications of which can readily be expressed. However, the route to such an expression, or the process of development, has not received any substantial attention.It is now agreed that a study of the development process affords notable benefits. Firstly, it helps to create an understanding of what a realistic development process is and how it proceeds from an initial specification to its acceptable representation. Secondly, the nature of guidance that can be provided by the next generation of CASE tools can be substantially improved. It can be expected that these tools will cease to be mere drafting aids and consistency checking programs. Instead it is likely that they will provide a procreative environment in which the development engineer will play an important role. This tool/user symbiosis should have a beneficial impact on both the productivity of the developer and on the quality of the product.In bringing together researchers and practitioners from such diverse areas as AI, Software Engineering, Decision Support and Information Systems, it is hoped this publication will take the quest to comprehend information system development processes a significant step forwards.
    • Cyber Reconnaissance, Surveillance and Defense

      • 1st Edition
      • October 16, 2014
      • Robert Shimonski
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 0 8 3
      • eBook
        9 7 8 0 1 2 8 0 1 4 6 8 4
      At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gatherin... and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.
    • Building an Information Security Awareness Program

      • 1st Edition
      • August 7, 2014
      • Bill Gardner + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 9 9 6 7 5
      • eBook
        9 7 8 0 1 2 4 1 9 9 8 1 1
      The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data. Forewords written by Dave Kennedy and Kevin Mitnick!
    • Optimized Cloud Resource Management and Scheduling

      • 1st Edition
      • October 15, 2014
      • Wenhong Dr. Tian + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 4 7 6 9
      • eBook
        9 7 8 0 1 2 8 0 1 6 4 5 9
      Optimized Cloud Resource Management and Scheduling identifies research directions and technologies that will facilitate efficient management and scheduling of computing resources in cloud data centers supporting scientific, industrial, business, and consumer applications. It serves as a valuable reference for systems architects, practitioners, developers, researchers and graduate level students.